Welcome!

News Feed Item

New Law Protects Pennsylvanians Recovering Lost Money and Items

Unclaimed Property "Finders" Will Be Subject to State Approval and Oversight

HARRISBURG, PA--(Marketwired - August 04, 2014) - At the urging of state Treasurer Rob McCord, legislation enacted this month will guard Pennsylvanians against fraud and deceptive practices when they employ a service to help them claim their money or property that has been turned over to the state.

With changes made through the Fiscal Code bill (Act 126 of 2014), new sections were added to the state's unclaimed property law allowing the Treasury to oversee those who for a fee assist others in locating and recovering unclaimed property -- commonly known as "finders." People engaging in that business will be required to apply for approval, register, and remain subject to Treasury oversight. McCord stressed that Pennsylvanians, businesses and other organization can always claim their property for free directly from the state Treasury Department.

"The vast majority of finders operate within the law, and they can provide a valuable service to some people who may either not know they have unclaimed property, or need help to retrieve it," McCord said. "Unfortunately, however, a relative few take advantage of those who are not fully aware of their rights."

Under long-standing Pennsylvania law, finders are permitted to charge up to 15 percent of the amount they help to claim. Treasury has regularly seen instances, however, of some finders charging a higher percentage, illegally adding additional fees on top of the allowable percentage, or fraudulently claiming the money or property themselves and passing only a small portion on to the rightful owner.

"We've seen some heartbreaking examples of people who desperately could have used the money they had coming to them, but instead sacrificed an excessively large share of it to an unscrupulous finder," McCord said.

McCord reiterated that for no charge, anyone can contact the state Treasury to check if they have unclaimed property, and initiate a claim. They can do so by visiting www.patreasury.gov or by calling toll free at 1-800-222-2046 Monday through Friday, 7:30 a.m. to 4:30 p.m. where a member of Treasury's Return Team will assist them.

Actions of some finders operating outside the law have required Treasury investigators and legal staff to invest considerable time and resources aiding and protecting citizens who have been defrauded, including making court appearances on some occasions. Often, Treasury staff has been forced to pursue cases that involve repeat offenders. McCord approached the legislature this year with suggested remedies that would permit Treasury to crack down on illegal operators while not heavily burdening those who abide by the law.

Under the new provisions, no person may act as a finder without first applying for and receiving a certificate of registration with the state Treasury. When submitting an application, finders will have to attest under penalty of perjury that they have not been convicted of a felony or certain other criminal offenses within 10 years and that they are not under investigation for such crimes, and agree to a background check to verify the information. Treasury will issue a registration certificate and number valid for two years, after which registration can be renewed. Treasury can also revoke, suspend or refuse to renew a registration under certain conditions and after due process. Finders violating the law will be subject to fines of up to $1,000 for a first offense and up to $5,000 for a subsequent offense. (More detail about the new sections of the law can be viewed here.)

Under the unclaimed property law, which was first enacted in 1929, Treasury each year receives millions of dollars in unclaimed property in the form of abandoned bank accounts, forgotten stocks, unclaimed insurance benefits, uncashed checks, contents of safe deposit boxes, and other sources of money or tangible items. 

Since January 2009, the McCord Treasury has received $1.3 billion in property and returned more than $572 million to rightful owners.

For more information, visit www.patreasury.gov.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
Most of us already know that adopting new cloud applications can boost a business’s productivity by enabling organizations to be more agile and ready to change course in our fast-moving and connected digital world. But the rapid adoption of cloud apps and services also brings with it profound security threats, including visibility and control challenges that aren’t present in traditional on-premises environments. At the same time, the cloud – because of its interconnected, flexible and adaptable...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...